Title :
The MITRE security perimeter
Author :
Goldberg, David S.
Author_Institution :
Mitre Corp., USA
Abstract :
To protect MITRE´s unclassified computing resources from unauthorized use, MITRE maintains a network firewall between the MITRE corporate network and the Internet, and limits dial-in to three modem pools. The firewall limits Internet connectivity to a small set of computer systems called boundary hosts. The boundary hosts and the modem pools use a smartcard-based user authentication scheme to ensure that only authorized MITRE employees can gain access to the corporate network. The combination of firewall, boundary hosts, and modem pools is known as the MITRE security perimeter. The paper describes the design of the security perimeter and the integration of the smartcard system into the boundary hosts and modem pools
Keywords :
Internet; authorisation; internetworking; smart cards; Internet connectivity; MITRE corporate network; MITRE security perimeter; authorized MITRE employees; boundary hosts; computer systems; corporate network; dial-in; modem pools; network firewall; smartcard system; smartcard-based user authentication scheme; unauthorized use; unclassified computing resources; Authentication; Computer networks; IP networks; Internet; Joining processes; LAN interconnection; Local area networks; Modems; Protection; TCPIP;
Conference_Titel :
Computer Security Applications Conference, 1994. Proceedings., 10th Annual
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-6795-8
DOI :
10.1109/CSAC.1994.367306